paykasa bozdurma
Home > Support > Blog
Why the Security Operations Center Is Becoming a Business Necessity

Why the Security Operations Center Is Becoming a Business Necessity

There is plenty of data that proves the increased volume and sophistication of IT security threats. But the problems run far deeper. It’s not just about stealing someone’s social security number or a company’s trade secrets. Cybercrime is now a preferred method of attack, literally, by terrorists and state-sponsored groups. Activist groups are hacking. Malware, malicious code and other hacking tools are constantly being bought and sold on the dark web. Cybercrime has become big business.

Monday, February 05, 2018/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (445)/Comments (0)/
Categories: Security Services
Digital Forensics Plays an Important Role in Security Incident Response

Digital Forensics Plays an Important Role in Security Incident Response

Fans of TV shows such as “CSI: Miami” are familiar with the forensic tools and procedures used to investigate crimes. Digital forensics employs similar techniques to gather evidence involving information technology.

Thursday, January 04, 2018/Author: Jill Belli, SIEM Engineeer/Number of views (792)/Comments (0)/
Categories: Security Services
Why the Security Operations Center Is Back, and How to Make It Work

Why the Security Operations Center Is Back, and How to Make It Work

A few years ago, the security operations center (SOC) was on the decline. The dedicated security team and facility that you might see in a TV or movie drama were largely phased out in favor of distributed teams and outsourcing. However, the emergence of both targeted external attacks and insider threats have made the SOC a virtual necessity.

Thursday, December 22, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1600)/Comments (0)/
Categories: Security Services
Creating an Incident Response Plan that Works

Creating an Incident Response Plan that Works

In a previous post, we discussed how security analytics integrates multiple data streams and pulls log information into a centralized system. This enables you to correlate security events from system logs and security tools, analyze the data in context, and compare it with threat intelligence.

Friday, October 21, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1284)/Comments (0)/
RSS